Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing 2010
DOI: 10.4108/icst.collaboratecom.2010.18
|View full text |Cite
|
Sign up to set email alerts
|

Combining access control and trust negotiations in an On-line Social Network

Abstract: Protection of On-line Social Networks (OSNs) resources has become a primary need since today OSNs are the hugest repository of personal information on the Web. This has resulted in the definition of some access control models tailored to the protection of OSN resources. One of the key parameter on which access control decisions in OSNs should be based is represented by the trust between OSN users. A wellknown approach for the management of trust relationships is represented by trust negotiations [1], [2]. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…We believe that one of the fundamental parameters on which access control decisions should be based in an open environment like OSNs is represented by user trust [10]. Our starting point in this paper is the OSN access control model proposed in [3] and further developed in [1], that allows OSN users to execute trust negotiations over their data items and resources. In such model -briefly outlined in Section 3 -it is possible to define several edge types, denoting the various kinds of relationship occurring among OSN users.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…We believe that one of the fundamental parameters on which access control decisions should be based in an open environment like OSNs is represented by user trust [10]. Our starting point in this paper is the OSN access control model proposed in [3] and further developed in [1], that allows OSN users to execute trust negotiations over their data items and resources. In such model -briefly outlined in Section 3 -it is possible to define several edge types, denoting the various kinds of relationship occurring among OSN users.…”
Section: Introductionmentioning
confidence: 99%
“…A resource in the OSN can be modelled as a pair (R, AttrList), where R ∈ RN and AttrList is a set of pairs (a, v), where a ∈ AN and v ∈ Va. In what follows, given a tuple t, we denote with comp(t) the value of the component comp of tuple t. We assume that OSN resources are protected according to the model presented in [3] and extended in [1]. According to this model, access control requirements of OSN users are expressed in terms of access rules specified by resource owners.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations